Topic: Security

Systems and Implemented Technologies for Data-Driven Innovation, addressing Data Spaces and Marketplaces Semantic Interoperability Needs

Systems and Implemented Technologies for Data-Driven Innovation, addressing Data Spaces and Marketplaces Semantic Interoperability Needs

In the second i3-MARKET series book we review the basic technological principles, software best practices, and standards for implementing and deploying data spaces and data marketplaces. The book provides a...
0 like counts
176 pages
2024-08-26 Published
Concepts and Design Innovations addressing the Digital Transformation of Data Spaces and Marketplaces

Concepts and Design Innovations addressing the Digital Transformation of Data Spaces and Marketplaces

In the first part of the i3-MARKET Book series we begin by discussing the principles of the modern data economy that makes readers more aware about the value of the...
0 like counts
164 pages
2024-08-26 Published
Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy

Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy

In the third i3-MARKET series book we focus on the best practices and simplest software methods and mechanisms that allow the i3-MARKET backplane reference implementation to be instantiated, tested and...
0 like counts
158 pages
2024-08-26 Published
Large Language Models in Cybersecurity

Large Language Models in Cybersecurity

This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the increased availability of powerful large language models (LLMs) and how they can be...
0 like counts
240 pages
2024-09-26 Published
The InfoSec Handbook

The InfoSec Handbook

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while...
0 like counts
416 pages
2014-08-30 Published
The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of...
0 like counts
436 pages
2014-01-27 Published
Cryptographic City

Cryptographic City

Cryptography's essential role in the functioning of the city, viewed against the backdrop of modern digital life. Cryptography is not new to the city; in fact, it is essential to...
0 like counts
280 pages
2023-05-16 Published
Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers,...
0 like counts
292 pages
2014-08-09 Published
A Practical Guide to TPM 2.0

A Practical Guide to TPM 2.0

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their...
0 like counts
419 pages
2015-01-24 Published
Managing Risk and Information Security, 2nd Edition

Managing Risk and Information Security, 2nd Edition

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served...
0 like counts
214 pages
2016-08-11 Published
Demystifying Internet of Things Security

Demystifying Internet of Things Security

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the...
0 like counts
518 pages
2019-08-14 Published
Rational Cybersecurity for Business

Rational Cybersecurity for Business

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to...
0 like counts
359 pages
2020-08-13 Published